Cargando…

Topics in Cryptology -- CT-RSA 2005 The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Menezes, Alfred John (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3376
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talks
  • Sub-linear Queries Statistical Databases: Privacy with Power
  • Malicious Cryptography: Kleptographic Aspects
  • Cryptanalysis
  • Resistance of SNOW 2.0 Against Algebraic Attacks
  • A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
  • Hold Your Sessions: An Attack on Java Session-Id Generation
  • Update on SHA-1
  • A Fast Correlation Attack on the Shrinking Generator
  • Public-Key Encryption
  • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
  • A Generic Conversion with Optimal Redundancy
  • Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
  • Signature Schemes
  • Foundations of Group Signatures: The Case of Dynamic Groups
  • Time-Selective Convertible Undeniable Signatures
  • Design Principles
  • On Tolerant Cryptographic Constructions
  • Password-Based Protocols
  • Simple Password-Based Encrypted Key Exchange Protocols
  • Hard Bits of the Discrete Log with Applications to Password Authentication
  • Proofs for Two-Server Password Authentication
  • Design and Analysis of Password-Based Key Derivation Functions
  • Pairings
  • A New Two-Party Identity-Based Authenticated Key Agreement
  • Accumulators from Bilinear Pairings and Applications
  • Computing the Tate Pairing
  • Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
  • Efficient and Secure Implementation
  • A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
  • CryptoGraphics: Secret Key Cryptography Using Graphics Cards
  • Side-Channel Leakage of Masked CMOS Gates
  • New Minimal Weight Representations for Left-to-Right Window Methods.